You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Overview
urllib3 is an HTTP library with thread-safe connection pooling, file post, and more.
Affected versions of this package are vulnerable to CRLF injection. Attacker who has the control of the requesting address parameter, could manipulate an HTTP header and attack an internal service.
Remediation
A fix was pushed into the master branch but not yet published.
The text was updated successfully, but these errors were encountered:
In requirements.txt file we pinned requests==2.20.1. The urllib3 is a dependency package of requests. We do not install urllib3 package by itself. urllib3 is download, when we install requests package.(pip install -r requirements.txt) The requests library come with urllib3 1.24.1 (urllib3<1.25,>=1.21.1).
Here is the log: from requests==2.21.0->-r requirements.txt (line 23)) Requirement already satisfied: **urllib3<1.25,>=1.21.1** in /Users/pkasireddy/.pyenv/versions/3.6.5/envs/crlf365/lib/python3.6/site-packages
Snyk remediation path tells to upgrade/install urllib3 v1.25 or higher. However, the urllib3 owners addressed the CRLF injection in urllib3v1.24.3. This version of urllib3 can be grabbed just by updating the requests v2.21.0. More on that here :https://github.com/kennethreitz/requests/issues/5065
The technical implementation is addressed in the PR #3744
@jason-upchurch thank you for doing all the research and identifying that synk CLI and web interface are not in sync when it comes scanning the vulnerabilities.
Closing this issue as CRLF injection is no longer a vulnerability on openFEC repo.
CRLF injection
Vulnerable module: urllib3
Introduced through: [email protected], [email protected] and others
Detailed paths
Overview
urllib3 is an HTTP library with thread-safe connection pooling, file post, and more.
Affected versions of this package are vulnerable to CRLF injection. Attacker who has the control of the requesting address parameter, could manipulate an HTTP header and attack an internal service.
Remediation
A fix was pushed into the master branch but not yet published.
The text was updated successfully, but these errors were encountered: